Page 22 of 192 results (0.006 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

JetBrains TeamCity before 2021.2.1 was vulnerable to stored XSS. JetBrains TeamCity versiones anteriores a 2021.2.1 era vulnerable a un ataque de tipo XSS almacenado. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

JetBrains TeamCity before 2021.2.1 was vulnerable to reflected XSS. JetBrains TeamCity versiones anteriores a 2021.2.1 era vulnerable a un ataque de tipo XSS reflejado. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

In JetBrains TeamCity before 2021.2, health items of pull requests were shown to users who lacked appropriate permissions. En JetBrains TeamCity versiones anteriores a 2021.2, los elementos de salud de las peticiones de extracción eran mostrados a usuarios que carecían de los permisos apropiados. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-276: Incorrect Default Permissions •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

In JetBrains TeamCity before 2021.2.1, an unauthenticated attacker can cancel running builds via an XML-RPC request to the TeamCity server. En JetBrains TeamCity versiones anteriores a 2021.2.1, un atacante no autenticado puede cancelar construcciones en ejecución por medio de una petición XML-RPC al servidor de TeamCity. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

JetBrains TeamCity before 2021.2 was vulnerable to a Time-of-check/Time-of-use (TOCTOU) race-condition attack in agent registration via XML-RPC. JetBrains TeamCity versiones anteriores a 2021.2, era vulnerable a un ataque de condición de carrera de tiempo de comprobación/tiempo de uso (TOCTOU) en el registro de agentes por medio de XML-RPC. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •